Results 1 to 10 of about 12,913 (227)
There are various types of encryption that can be used, for example MD5 and SHA-256. However, using MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack.
Santi Sulastri, Riana Defi Mahadji Putri
doaj +4 more sources
Performance analysis of MD5 [PDF]
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be implemented in software and hardware, and discusses whether its use interferes with high bandwidth networking.
Joseph D. Touch
openalex +3 more sources
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj +2 more sources
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC [PDF]
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes the HMAC/NMAC-MD5 from HMAC/NMAC with a random function. The attack needs 297 queries, with a success probability 0.87, while the previous distinguishing attack on HMAC-MD5 reduced to 33 rounds takes 2126.1 messages with a ...
Xiaoyun Wang+4 more
openalex +3 more sources
Marek’s Disease Virus (MDV) Meq Oncoprotein Plays Distinct Roles in Tumor Incidence, Distribution, and Size [PDF]
Marek’s disease (MD), characterized by the rapid onset of T-cell lymphomas in chickens, is caused by Mardivirus gallidalpha2, an oncogenic alphaherpesvirus commonly known as Marek’s disease virus (MDV).
Dharani K. Ajithdoss+3 more
doaj +2 more sources
Architecture based on MD5 and MD5-512 Bit Applications
Researchers have found many flaws in hash function such as MD5 algorithm. It has been one of the most widely used hash algorithm and it has been indicated that there is a security threat in the algorithm. Furthermore, a MD5 hash output may not offer sufficient protection in the near future.
Vandana Pandey, Vipul Kumar Mishra
openalex +3 more sources
Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study [PDF]
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Ezequiel Rey+4 more
doaj +2 more sources
Dynamic Changes in Viral Loads during Co-Infection with a Recombinant Turkey Herpesvirus Vector Vaccine and Very Virulent Marek’s Disease Virus In Vivo [PDF]
Marek’s disease (MD), caused by the Marek’s disease virus (MDV), is a common infectious tumor disease in chickens and was the first neoplastic disease preventable by vaccination.
Tian Ding+9 more
doaj +2 more sources
Key Change Strategies for TCP-MD5
The TCP-MD5 option is most commonly used to secure BGP sessions between routers. However, changing the long-term key is difficult, since the change needs to be synchronized between different organizations. We describe single-ended strategies that will permit (mostly) unsynchronized key changes.
Steven M. Bellovin
openalex +5 more sources
Security Analysis of MD5 algorithm in Password Storage [PDF]
Hashing algorithms are commonly used to convert passwords into hashes which theoretically cannot be deciphered. This paper analyses the security risks of the hashing algorithm MD5 in password storage and discusses different solutions, such as salts and iterative hashing.
Mary Cindy Ah Kioon+2 more
openalex +2 more sources